Fast downstream to many (computational) RFIDs

We present Stork — an extension of the EPC C1G2 protocol allowing streaming of data to multiple Computational Radio Frequency IDentification tags (CRFIDs) simultaneously at up to 20 times faster than the prior state of the art. Stork introduces downstream attributes never before seen in (C)RFIDs: (i) fast feedback for CRFID downstream verification based on the internal EPC C1G2 memory check command — which we analytically and experimentally show to be the best possible downstream verification process based on EPC C1G2; (ii) ability to perform multi-CRFID transfer — which in our experiments speeds up downstream by more than two times compared to sequential transmission; and (iii) the use of compressed data streams — which improves firmware reprogramming times by up to 10% at large reader-to-CRFID distances.

[1]  Erick William Fuentes RFIDIoT: RFID as the data link layer for the internet of things , 2015 .

[2]  Joshua R. Smith,et al.  Wisent: Robust downstream communication and storage for computational RFIDs , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[3]  Marco Cattani,et al.  Gondola: a Parametric Robot Infrastructure for Repeatable Mobile Experiments: Demo Abstract , 2016, SenSys.

[4]  Deepak Ganesan,et al.  Flit: a bulk transmission protocol for RFID-scale sensors , 2012, MobiSys '12.

[5]  Wenyu Yang,et al.  Wireless firmware execution control in computational RFID systems , 2015, 2015 IEEE International Conference on RFID (RFID).

[6]  Farinaz Koushanfar,et al.  Chime: Checkpointing Long Computations on Interm ittently Energized IoT Devices , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[7]  Adam Dunkels,et al.  Efficient Sensor Network Reprogramming through Compression of Executable Modules , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[8]  Joshua R. Smith,et al.  μMonitor: In-situ energy monitoring with microwatt power consumption , 2016, 2016 IEEE International Conference on RFID (RFID).

[9]  R. Sarathkumar,et al.  Data Integrity Checking in Dynamic Cloud , 2018 .

[10]  David Wetherall,et al.  The Emergence of RF-Powered Computing , 2014, Computer.

[11]  Kevin Fu,et al.  Mementos: system support for long-running computation on RFID-scale devices , 2011, ASPLOS XVI.

[12]  Die Wu,et al.  R2: Over-the-air reprogramming on computational RFIDs , 2016, 2016 IEEE International Conference on RFID (RFID).

[13]  Joshua R. Smith,et al.  WISPCam: A battery-free RFID camera , 2015, 2015 IEEE International Conference on RFID (RFID).

[14]  Brandon Lucia,et al.  A simpler, safer programming and execution model for intermittent systems , 2015, PLDI.

[15]  Joshua R. Smith,et al.  BLISP: Enhancing backscatter radio with active radio for computational RFIDs , 2016, 2016 IEEE International Conference on RFID (RFID).

[16]  Roy Want,et al.  RFID Technology and Applications , 2006, IEEE Pervasive Computing.